What is IoT, and how do you handle it safely?

Securely handling Internet of Things, in an age of working from home

Amsterdam, Jan. 18, 2022 By Max de Vries

Working more from home means being even smarter with your devices. Something used by many people is Internet of Things (IoT). Sounds difficult, isn’t it; you use it yourself. All devices connected to the Internet are considered IoT. This used to only involve a computer or a laptop; today you can even hear that stubborn neighbor talking about his smart doorbell. There are countless other products that can be connected to the Internet today, think: lamps, ovens, thermostats, means of transportation and much more! By controlling it remotely, you can easily see what the status of your product is and you can switch when and where you want, which is ideal!

IOT OFFERS MANY OPPORTUNITIES, BUT DANGER IS IN A SMALL CORNER

Devices connected to the Internet offer many possibilities, however, it can also create danger. In fact, they are quite vulnerable to security breaches. For example, even a simple lamp that you control through an app can cause your data to be out on the street. Now you’re thinking, isn’t that a bit far-fetched? The answer is “No”; research has shown that last year, some 1.51 billion data breaches occurred worldwide due to IoT devices. That’s an increase of 600 million compared to 2020. What often happens is that hackers can penetrate IoT devices and then reprogram them to intercept and relay your network traffic. One example is the security breach of Philips lamps in 2020. Here, hackers could take over the lights and eavesdrop on traffic on the connected WiFi network. Philips eventually resolved this quickly, but think of companies that don’t have such a reputation to uphold, security is sometimes not handled as well there. Therefore, it is important to increase your cyber awareness.

Interim conclusion: Using IoT devices can be convenient, but it also has dangers. Good technical security is therefore important. But how do you do this?

  1. The best thing you can do to prevent a data breach by IoT devices is to create a separate network for them. Consider a VPN, for example, but deploying an additional router is also an option.
  2. Paying close attention is also important. A flickering bulb could mean that it is simply broken, or that someone from the outside is working on it. So watch for suspicious behavior from your smart devices.
  3. In addition, a best-practice might be to make a list of all network-connected devices in the home and check this list monthly to see if updates are available. If yes, download immediately. These updates provide higher security for these devices. If there are devices that never receive updates, you can write them off after a while or shut them down on a separate WiFi network.
  4. It is also important to provide each smart device with a strong password. Ideally, use a password generator and store all login information in a password manager. Indeed, the default passwords of IoT devices are often easily found in the manuals of these devices.
  5. The last tip I want to give you is: check with some regularity unknown WiFi networks that indicate high signal strength. If a WiFi network is suspicious, turn off your smart devices once. Does the WiFi network then disappear and reappear when you turn the smart devices back on?Then reset the router or VPN these devices were connected to.

With these five tips, you’ll be better protected against the dangers of IoT devices. Want to learn more about increasing your digital intuition? Then contact Tom below, or look further on our website.

Also check out these blogs

Overcoming Skepticism
Cyber security is critical in the modern world for organizations regardless of...
The NIS2 Guideline is coming
Network and Information System2 In an increasingly digitized world, businesses and organizations...
Court reports dissected: Information security in our municipalities.
Discover the most common IB&P weaknesses within Dutch municipalities. What are we...
Need tailored advice?

Schedule a free consultation with our cyber security consultant.